Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/02/2023, 10:49
Static task
static1
Behavioral task
behavioral1
Sample
70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe
Resource
win10v2004-20220812-en
General
-
Target
70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe
-
Size
2.5MB
-
MD5
e1c771cceb693ea14bbcde32ac1355fc
-
SHA1
bc2da06db4b0cc42595b7761ff990e303441cd99
-
SHA256
70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9
-
SHA512
fcbb24d7f938145fb82bd6d1d609a4416d78a9285499078ddabf558cac050319bac06c2b6fccdea3ec558e71c5589fb2bc76c6bee6cb4d02dd2691ded8ef2eff
-
SSDEEP
24576:CsLDsY5ohQjNm5lGrJrGU/thfLixwfA7DgCBbZoiSNy5aKg88vX6yqlAtVULkfSO:C3FYVr4U/3L7yRAUQKuakLomg0BqKqw
Malware Config
Extracted
remcos
IKMERRO2023
5.2.68.82:1198
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
Explorer.exe
-
copy_folder
ATM Machine
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
1234567ME
-
mouse_option
false
-
mutex
12345ME-2V5C4Q
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Explorer
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation Explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 2596 Explorer.exe 4656 Explorer.exe 1780 Explorer.exe 3968 Explorer.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ 70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Explorer = "\"C:\\ProgramData\\ATM Machine\\Explorer.exe\"" 70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ Explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Explorer = "\"C:\\ProgramData\\ATM Machine\\Explorer.exe\"" Explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ Explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Explorer = "\"C:\\ProgramData\\ATM Machine\\Explorer.exe\"" 70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Explorer = "\"C:\\ProgramData\\ATM Machine\\Explorer.exe\"" Explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Dgtxdkhrpw = "\"C:\\Users\\Admin\\AppData\\Roaming\\Kyjsafxspwa\\Dgtxdkhrpw.exe\"" 70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Dgtxdkhrpw = "\"C:\\Users\\Admin\\AppData\\Roaming\\Kyjsafxspwa\\Dgtxdkhrpw.exe\"" Explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1496 set thread context of 2636 1496 70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe 82 PID 2596 set thread context of 3968 2596 Explorer.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4164 powershell.exe 4164 powershell.exe 3128 powershell.exe 3128 powershell.exe 2596 Explorer.exe 2596 Explorer.exe 2596 Explorer.exe 2596 Explorer.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1496 70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe Token: SeDebugPrivilege 4164 powershell.exe Token: SeDebugPrivilege 2596 Explorer.exe Token: SeDebugPrivilege 3128 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3968 Explorer.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1496 wrote to memory of 4164 1496 70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe 78 PID 1496 wrote to memory of 4164 1496 70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe 78 PID 1496 wrote to memory of 4164 1496 70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe 78 PID 1496 wrote to memory of 2636 1496 70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe 82 PID 1496 wrote to memory of 2636 1496 70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe 82 PID 1496 wrote to memory of 2636 1496 70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe 82 PID 1496 wrote to memory of 2636 1496 70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe 82 PID 1496 wrote to memory of 2636 1496 70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe 82 PID 1496 wrote to memory of 2636 1496 70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe 82 PID 1496 wrote to memory of 2636 1496 70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe 82 PID 1496 wrote to memory of 2636 1496 70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe 82 PID 1496 wrote to memory of 2636 1496 70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe 82 PID 1496 wrote to memory of 2636 1496 70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe 82 PID 1496 wrote to memory of 2636 1496 70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe 82 PID 1496 wrote to memory of 2636 1496 70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe 82 PID 2636 wrote to memory of 2596 2636 70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe 84 PID 2636 wrote to memory of 2596 2636 70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe 84 PID 2636 wrote to memory of 2596 2636 70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe 84 PID 2596 wrote to memory of 3128 2596 Explorer.exe 85 PID 2596 wrote to memory of 3128 2596 Explorer.exe 85 PID 2596 wrote to memory of 3128 2596 Explorer.exe 85 PID 2596 wrote to memory of 4656 2596 Explorer.exe 91 PID 2596 wrote to memory of 4656 2596 Explorer.exe 91 PID 2596 wrote to memory of 4656 2596 Explorer.exe 91 PID 2596 wrote to memory of 1780 2596 Explorer.exe 93 PID 2596 wrote to memory of 1780 2596 Explorer.exe 93 PID 2596 wrote to memory of 1780 2596 Explorer.exe 93 PID 2596 wrote to memory of 3968 2596 Explorer.exe 92 PID 2596 wrote to memory of 3968 2596 Explorer.exe 92 PID 2596 wrote to memory of 3968 2596 Explorer.exe 92 PID 2596 wrote to memory of 3968 2596 Explorer.exe 92 PID 2596 wrote to memory of 3968 2596 Explorer.exe 92 PID 2596 wrote to memory of 3968 2596 Explorer.exe 92 PID 2596 wrote to memory of 3968 2596 Explorer.exe 92 PID 2596 wrote to memory of 3968 2596 Explorer.exe 92 PID 2596 wrote to memory of 3968 2596 Explorer.exe 92 PID 2596 wrote to memory of 3968 2596 Explorer.exe 92 PID 2596 wrote to memory of 3968 2596 Explorer.exe 92 PID 2596 wrote to memory of 3968 2596 Explorer.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe"C:\Users\Admin\AppData\Local\Temp\70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4164
-
-
C:\Users\Admin\AppData\Local\Temp\70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exeC:\Users\Admin\AppData\Local\Temp\70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe2⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\ProgramData\ATM Machine\Explorer.exe"C:\ProgramData\ATM Machine\Explorer.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
-
C:\ProgramData\ATM Machine\Explorer.exe"C:\ProgramData\ATM Machine\Explorer.exe"4⤵
- Executes dropped EXE
PID:4656
-
-
C:\ProgramData\ATM Machine\Explorer.exe"C:\ProgramData\ATM Machine\Explorer.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3968
-
-
C:\ProgramData\ATM Machine\Explorer.exe"C:\ProgramData\ATM Machine\Explorer.exe"4⤵
- Executes dropped EXE
PID:1780
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5e1c771cceb693ea14bbcde32ac1355fc
SHA1bc2da06db4b0cc42595b7761ff990e303441cd99
SHA25670a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9
SHA512fcbb24d7f938145fb82bd6d1d609a4416d78a9285499078ddabf558cac050319bac06c2b6fccdea3ec558e71c5589fb2bc76c6bee6cb4d02dd2691ded8ef2eff
-
Filesize
2.5MB
MD5e1c771cceb693ea14bbcde32ac1355fc
SHA1bc2da06db4b0cc42595b7761ff990e303441cd99
SHA25670a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9
SHA512fcbb24d7f938145fb82bd6d1d609a4416d78a9285499078ddabf558cac050319bac06c2b6fccdea3ec558e71c5589fb2bc76c6bee6cb4d02dd2691ded8ef2eff
-
Filesize
2.5MB
MD5e1c771cceb693ea14bbcde32ac1355fc
SHA1bc2da06db4b0cc42595b7761ff990e303441cd99
SHA25670a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9
SHA512fcbb24d7f938145fb82bd6d1d609a4416d78a9285499078ddabf558cac050319bac06c2b6fccdea3ec558e71c5589fb2bc76c6bee6cb4d02dd2691ded8ef2eff
-
Filesize
2.5MB
MD5e1c771cceb693ea14bbcde32ac1355fc
SHA1bc2da06db4b0cc42595b7761ff990e303441cd99
SHA25670a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9
SHA512fcbb24d7f938145fb82bd6d1d609a4416d78a9285499078ddabf558cac050319bac06c2b6fccdea3ec558e71c5589fb2bc76c6bee6cb4d02dd2691ded8ef2eff
-
Filesize
2.5MB
MD5e1c771cceb693ea14bbcde32ac1355fc
SHA1bc2da06db4b0cc42595b7761ff990e303441cd99
SHA25670a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9
SHA512fcbb24d7f938145fb82bd6d1d609a4416d78a9285499078ddabf558cac050319bac06c2b6fccdea3ec558e71c5589fb2bc76c6bee6cb4d02dd2691ded8ef2eff
-
Filesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
Filesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
Filesize
16KB
MD5e587085d0b14b3f04eedc15f9f7d703e
SHA18e1b85a18e71a321a432463b70846839878b8db4
SHA256b96cc14efd59e7fe60801bc93a57447cf1ec7d38090d57a41af2bea51855ff36
SHA512e9796afeb8dd0f8dccd7f3f471f36fc3a95bc24d9d0fa99958986d5fed36eef6bcde09fbd82ad6b489e29d26d3c38d60c5a6ff25689af34877bdf10edf2237f8
-
Filesize
2.5MB
MD506914d2998f5a97addb2f5f4f93721e8
SHA19d71f97ed4a634deae6fe9c4af992309f818c8b1
SHA256da7c430db04dd9ef9b1dcf1f6134af8e701144ca277bed4f864650b0db199490
SHA512765620681536be110a084b87d088c2e3d7908855dda7b67a947842f5a66c706e4519ecd599321f6de0d31321f41a581b4e31dc15e6f85d3dee72674868f30fe0